Password Cracking: Telnet
In this article, we delve into Telnet Password Cracking techniques using tools like Hydra, Ncrack, Patator, and Metasploit. Additionally, by trying to obtain illegal access through brute-force attacks, these techniques allow penetration testers to evaluate the security of Telnet services. Ultimately, comprehending these methods is essential for detecting weaknesses and fortifying network defenses.
Table of Contents
- Hydra
- Ncrack
- Patator
- Metasploit
Hydra
Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more
Now, we need to choose a word list. As with any dictionary attack, the wordlist is key. Kali has numerous wordlists built right in.
Run the following command
hydra -L /root/Desktop/user.txt -P /root/Desktop/pass.txt 192.168.1.106 telnet
Here
-L: denotes the path for username list
-P: denotes the path for the password list
As you can observe that we had successfully grabbed the Telnet username as xander and password as 123.
Ncrack
Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
Run the following command
ncrack -U /root/Desktop/user.txt –P /root/Desktop/pass.txt 192.168.1.106:23
Here
-U: denotes the path for username list
-P: denotes the path for the password list
As you can observe that we had successfully grabbed the Telnet username as xander and password as 123.
Patator
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. It is quite useful for making brute force attack on several ports such as FTP, HTTP, SMB and etc.
patator telnet_login host=192.168.1.106 inputs='FILE0\nFILE1' 0=/root/Desktop/user.txt 1=/root/Desktop/pass.txt persistent=0 prompt_re='Username: | Password:'
From given below image you can observe that the process of dictionary attack starts and thus, you will attain the username and password of your victim.
Metasploit
This module will test a telnet login on a range of machines and report successful logins. If you have loaded a database plugin and connected to a database this module will record successful logins and hosts so you can track your access.
Open Kali terminal type msfconsole Now type
use auxiliary/scanner/telnet/telnet_login set rhosts 192.168.1.106 (IP of Remote Host) set user_file /root/Desktop/user txt set pass_file /root/Desktop/pass.txt set stop_on_success true exploit
From given below image you can observe that we had successfully grabbed the telnet password and username, moreover Metasploit serves an additional benefit by providing remote system command shell for unauthorized access into victim’s system.
Conclusion
Telnet, despite being a legacy protocol, is still widely used in certain networks, making it a tempting target for attackers due to its lack of encryption and weak security mechanisms. Moreover, effective Telnet Password Cracking techniques, like those demonstrated with Hydra, Ncrack, Patator, and Metasploit, highlight the critical need for strong password policies, regular audits, and the adoption of more secure alternatives like SSH. Furthermore, as penetration testers, understanding these vulnerabilities allows us to identify and mitigate risks, ensuring a more secure network environment. Finally, remember, proactive defense is the key to robust cybersecurity.
To learn more about Password Cracking. Follow this Link.
Author: Aarti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here